• Title/Summary/Keyword: Dysfunction of Information

Search Result 173, Processing Time 0.031 seconds

Critical Care Management Following Lung Transplantation

  • Jeon, Kyeongman
    • Journal of Chest Surgery
    • /
    • v.55 no.4
    • /
    • pp.325-331
    • /
    • 2022
  • Postoperative critical care management for lung transplant recipients in the intensive care unit (ICU) has expanded in recent years due to its complexity and impact on clinical outcomes. The practical aspects of post-transplant critical care management, especially regarding ventilation and hemodynamic management during the early postoperative period in the ICU, are discussed in this brief review. Monitoring in the ICU provides information on the patient's clinical status, diagnostic assessment of complications, and future management plans since lung transplantation involves unique pathophysiological conditions and risk factors for complications. After lung transplantation, the grafts should be appropriately ventilated with lung protective strategies to prevent ventilator-induced lung injury, as well as to promote graft function and maintain adequate gas exchange. Hypotension and varying degrees of pulmonary edema are common in the immediate postoperative lung transplantation setting. Ventricular dysfunction in lung transplant recipients should also be considered. Therefore, adequate volume and hemodynamic management with vasoactive agents based on their physiological effects and patient response are critical in the early postoperative lung transplantation period. Integrated management provided by a professional multidisciplinary team is essential for the critical care management of lung transplant recipients in the ICU.

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

Drones flying and violations of privacy laws, such as riskon (드론비행과 사생활침해 등 법률위반 위험성 연구)

  • Jeong, Soonchae;Mfitumukiza, Joseph;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.22-27
    • /
    • 2017
  • In this paper, A heightened interest in the latest drone, yet steady increase in the field to exploit them. The next market is expected to be vastly improved, and use drone also increasingly will be strengthened. But also not a few side effects of him. In order to use safer and more commonly a drone safety and privacy protection, and there are many issues that need to be considered. Violating privacy laws, such as relations caused by the drone flight and review this study ways to resolve the breach. The flight due to a draw at peace with human life and behavior and enjoy it, but this problem created by new outbreak.

CHARACTERISTICS OF ATTENTION DEFICIT OF ADHD ON COMPUTERIZED NEUROCOGNITIVE FUNCTION TESTS (전산화 신경인지기능검사를 이용한 주의력결핍/과잉운동 장애의 주의력결핍특성에 관한 연구)

  • Chung, Sun-Ju;Shin, Min-Sup;Ha, Kyoo-Seob;Hong, Kang-E
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.8 no.2
    • /
    • pp.242-255
    • /
    • 1997
  • Characteristics of attention deficit of attention-deficit hyperactivity disorder(ADHD) were investigated by administering six computerized attention tests of Vienna Test System and four neuropsychological tests to children aged 6-12, with ADHD(n=21) and age-matched normal control children(n=22). The findings indicated that ADHD children show lower level of vigilance, more decline of performance in vigilance task on time, and impaired preparedness to response. They also have selective attention deficit on monitoring tasks, but did not have sustained attention deficit compared with normal control children. On the tasks wich overload their information processing capacity, ADHD children show more impulsive response pattern than normal control children. The performance of ADHD was worse than control on the neuropsychological tests sensitive to frontal lobe dysfunction. The presense 'These' attention deficits supports the theory that the defect of ADHD is due to the dysfunction of more than one brain region, including brain stem reticular formation and frontal lobe.

  • PDF

Analysis of information ethics education in the secondary school informatics teacher training programs of several graduate schools of education (교육대학원의 중등 정보교사 양성 과정에서 정보윤리교육 현황 분석)

  • Yang, HyeJi;Ki, JaMee
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.2
    • /
    • pp.23-34
    • /
    • 2017
  • Information ethics, which is closely related to changes that occur in information technology, had been comprised of one unit ever since the curriculum was revised in 2007 from whence 'informatics' was established as the first course, and has remained so even after the curriculum was revised in 2015. The purpose of this study was to analyze the degree of content knowledge required of informatics teachers who will teach information ethics by distinguishing the subject from general ethics, and to grasp the status of information ethics education at graduate schools of education. In order to achieve this, the information ethics questions of the informatics teacher appointment exam from years 2002 to 2015 were analyzed as well as the curriculums of 32 graduate schools of education. The results of the study revealed that, first, questions related to information ethics were included in 10 exams, since the 2004 exam. Second, questions related to dysfunction were mainly addressed from the beginning of administering the exam but since 2010 many items related to copyrights, information security, and various addictions were added. Third, 11(33%) of the 32 graduate schools of education with informatics teacher training provide information ethics courses. This study is meaningful in that it will help to better understand the changes needed to update the information ethics related questions of the informatics teacher appointment exam, and to present a direction for information ethics education at graduate schools of education.

Development of Assessment Tool about Professionalism of the Information Ethics Teachers (정보윤리 담당교사의 전문성 평가도구 개발)

  • Kim, Kil-Mo;Kim, Seong-Soo;Kim, Seong-Sik
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.1
    • /
    • pp.1-11
    • /
    • 2014
  • As the development of the information society, our lives enriched and became more convenient. However it leads to the dysfunction. These dysfunctions appear especially to teenagers. Information Ethics education should be strengthened in order to solve these problems. However experts in the subject of Information Ethics are lacking. The goal of this study is to find some factors of professionalism of teachers responsible for Information Ethics education and to develop an assessment tool. In this study, we find some factors of professionalism of Information Ethics teachers, make some preliminary questions and select some of them by discussing with experts. Through a preliminary and main inspection we analyze the reliability and validity of the questions and develop the final questions. To practically use the assessment tool, we consisted the standards table. This assessment tool can be used for evaluation an Information Ethics teacher's ability, used as the basic materials for improving it and suggested making some systematic curriculums for teacher's training.

Adults' concern for oral health and subjective oral health symptoms (성인의 구강건강관심 및 주관적 구강건강증상)

  • Lee, Sun-Mi;Kim, Sun-Kyung;Kang, Boo-Wol
    • Journal of Korean society of Dental Hygiene
    • /
    • v.11 no.6
    • /
    • pp.871-880
    • /
    • 2011
  • Objectives : The purpose of this study was to examine the self-rated oral health concern of adults over the age of 20 and from all over the country and their subjective oral health symptoms in a bid to provide some information on oral health policy setting for adults. Methods : The subjects in this study were 3,558 adults who voluntarily participated in a survey conducted by this researcher at the website of a company. After their answer sheets were analyzed, the following findings were given: Results : 1. 81 percent replied that they were very concerned about oral health. As to the relationship between their general characteristics and oral health concern, there were statistically significant differences in that regard according to their gender, age, purpose of seeing a dentist and occupation. 2. As for the relationship of their general characteristics to subjective awareness of oral health symptoms, there were statistically significant gaps in that aspect according to their gender, age, purpose of seeing a dentist, occupation and state of smoking. 3. In regard to the relationship between oral health concern and subjective awareness of oral health symptoms, those who were more concerned about oral health felt less subjective oral symptoms, but the difference between them and the others was not significant. The respondents who felt more symptoms of dental caries felt more symptoms of periodontal diseases as well. Conclusions : The above-mentioned findings indicate that in order to help adults promote or maintain their oral health, their concern for oral health should be stimulated by providing them with a lot of diverse information, and it seems that the development of programs that can eliminate their subjective oral symptoms of dental caries and peridontal diseases, the primary causes of tooth dysfunction, is required.

Segmentation and 3-Dimensional Reconstruction of Liver using MeVisLab (MeVisLab을 이용한 간 영역 분할 및 3차원 재구성)

  • Shin, Min-Jun;Kim, Do-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1765-1772
    • /
    • 2012
  • Success rate of transplantation of body organs improved due to development of medical equipment and diagnostic technology. In particular, a liver transplant due to liver dysfunction has increased. With the development of image processing and analysis to obtain the volume for liver transplantation have increased the accuracy and efficiency. In this thesis, we try to reconstruct the regions of the liver within three dimensional images using the mevislab tool, which is effective in quick comparison and analysis of various algorithms, and in expedient development of prototypes. Liver is divided by applying threshold values and region growing method to the original image, and by removing noise and unnecessary entities through morphology and region filling, and setting of areas of interest. It is deemed that high temporal efficiency, and presentation of diverse range of comparison and analysis module application methods through usage of MeVisLab would make contribution towards expanding of baseline of medical image processing researches.

Expression and Characterization of Bovine DNA Methyltransferase I

  • Chang, Yoo-Min;Yang, Byoung-Chul;Hwang, Seong-Soo;Yoon, Jong-Taek;Min, Kwan-Sik
    • Reproductive and Developmental Biology
    • /
    • v.33 no.2
    • /
    • pp.93-98
    • /
    • 2009
  • In this study, bovine Dnmt1 cDNA was sequenced and detected Dnmt1 mRNA level in bovine tissues by northern blot, methylation pattern of genome by southern blot, specific localization of Dnmt1 in mouse and bovine preimplantation embryos by immunocytostaining and Dnmt1 protein level in ovary and testis by western blot. Bovine Dnmt1 cDNA sequence showed more homology with that of human than mouse and rat. The RNA level of Dnmt1 was 10 times higher expression in placenta than other tissues. This indicates that placenta was hypermethylated compared to others organs. The genomic DNA could not be cut by a specific restriction enzyme (HpaII) in placenta, lung and liver of bovine. It suggests that Dnmt1 in some somatic cells was already methylated. Dnmt1, which has the antibody epitope 1316~1616, was distributed in nucleus and cytoplasm including the stage of pronuclear stage and maturation of oocyte and gradually weaken to blastocyst stage compare to negative. In addition, Dnmt1 was strongly expressed in tetraploid embryo and cloned 8-cell than IVF 8-cell. An aberrant pattern of DNA methylation in cloned embryo may be abnormal development of fetus, embryonic lethality and placenta dysfunction. The somatic specific band (190kDa) was appeared in ovary and testis, but oocyte specific band (175kDa) was not. Further investigations are necessary to understand the complex links between the methyltransferases and the transcriptional activity of genes in the cloned bovine tissues.

Improving the Key Search using Parallelism in RFID Privacy Protection

  • Shin, Myeong-Sook;Kim, Choong-Woon;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.1
    • /
    • pp.19-24
    • /
    • 2007
  • Abstract. In the ubiquitous environment of the next generation, RFID is predicted to occupy an important technical location and also expected to apply to various fields. However, the properties of tags in itself which is the core of RFID have a dysfunction like an invasion of privacy for user. An existing cryptanalytic protection scheme of the information leakage have a difficult problem to apply to RFID tags for privacy protection. We applied Ohkubo et al.'s scheme to the protection of the tag's information efficiently in the RFID system environment using low-cost tags. But, this method has all informations of tagsto identify tag's ID and then performs the process of identification in sequence in the Back-end server. These processes have lots of computations so that it have problems about a scalability. In this paper, we are based on Ohkubo et al.'s scheme to solve problems, and then analyze the parallelism with the Hellman's tradeoff method, divide it into nodesin parallel. In this paper, we are based on Okubo et al.'s scheme to solve problems, and then analyze the parallelism with Hellman's tradeoff method, divide it into the ${\omega}$ node in parallel. as a result, we can reduce the computing complexity of key search to $O(\frac{m^{2/3}n^{2/3}}{\omega})$ seconds from O(mm) seconds. finally we show the results to be enhanced the scalability.

  • PDF